Welcome to Packet Hacking Village
12:00-13:00 RCE via Meow Variant along with an Example 0day
12:00-13:00 RCE via Meow Variant along with an Example 0day
1.0. What is Bash? 2.0. Two-tier restriction 3.0. Some Alternative Bypass Restriction Techniques 4.0. Ericsson NL MPS Command Injection Vulnerability 5.0. Bypass Bash Restriction 6.0. What is Meow Variant? 7.0. Putting it All Together and Preparing a Metasploit Module 8.0. Time to Exploit
+------------+ +------------+ \_ | Atacker | | BASH | \_ +------------+ +------------+ \_ | Payload (Gate 1) | Payload (Gate 4) \_ +-------------------+ +-------------------+ \_ | Protocol Based | | Source Code Based | | Second tier | Restriction | ex.HTTP | Restriction | CMD Inj _| +-------------------+ +-------------------+ _/ \ / \ Payload (Gate 2) / Payload (Gate 3) \_______+---------------+_______/ | | \_ | Application | _/ \_ | | _/ \_ +---------------+ _/ \_ _/ \______________first tier______________/I'm assuming the first tier is all of these. The second tier starts after reaching the shell. A vulnerability you discover for running commands on the server indicates that you have bypassed the first tier. The real challenge starts when you want to be comfortable on the server. Because the attack payload you will use at this point should bypass two-tier restriction. By passing through these gates, the attacker must matures the payload and try to achieve its ultimate goal.